Blockchain-based privacy-preserving system for genomic data management using local differential privacy

YH Park, Y Kim, J Shim - Electronics, 2021 - mdpi.com
The advances made in genome technology have resulted in significant amounts of genomic
data being generated at an increasing speed. As genomic data contain various privacy …

Securing bioinformatics cloud for big data: Budding buzzword or a glance of the future

B Seth, S Dalal, R Kumar - Recent advances in computational intelligence, 2019 - Springer
Insight to utilize the Big data of Bioinformatics information generated by a paradigm; Cloud
Computing is coming up as a guarantee to deal with big information storage and scrutiny …

Recent advances in practical secure multi-party computation

S Ohata - IEICE Transactions on Fundamentals of Electronics …, 2020 - search.ieice.org
Secure multi-party computation (MPC) allows a set of parties to compute a function jointly
while keeping their inputs private. MPC has been actively studied, and there are many …

Privacy-preserving substring search on multi-source encrypted gene data

S Qin, F Zhou, Z Zhang, Z Xu - IEEE Access, 2020 - ieeexplore.ieee.org
Substring searching on gene sequence data is widely used for analyzing the association
between a list of gene mutations and a specific disease. As substring search usually has a …

Homomorphic encryption for privacy-preserving genome sequences search

Y Yamada, K Rohloff, M Oguchi - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Genome sequence search is useful, for example, in clinical applications where a care
provider needs to select a treatment option for a patient based on the exact kind of cancer …

Privacy-Preserving Multi-Party Search via Homomorphic Encryption with Constant Multiplicative Depth

MI Pleşa, RF Olimid - Cryptology ePrint Archive, 2024 - eprint.iacr.org
We propose a privacy-preserving multiparty search protocol using threshold-level
homomorphic encryption, which we prove correct and secure to honest but curious …

A homomorphism based zero knowledge proof of authentication for chinese remainder theorem based secret sharing

P Roy - Social Transformation–Digital Way: 52nd Annual …, 2018 - Springer
This paper proposes a secure computation model for zero knowledge proof of authentication
for Chinese remainder theorem based secret sharing method. The model considers frauds …

[PDF][PDF] Homomorphic Encryption for Privacy-Preserving Genome Sequences Search

M Oguchi, K Rohloff, Y Yamada - … Workshop on Big Data and IoT …, 2019 - ogl.is.ocha.ac.jp
Genome sequence search is useful, for example, in clinical applications where a care
provider needs to select a treatment option for a patient based on the exact kind of cancer …

[PDF][PDF] Comparison and analysis of system designs for privacy-preserving genome sequences search

Y Yamada, M Oguchi - International Conference on Emerging …, 2019 - personales.upv.es
Genome sequences search is useful, for example, in clinical applications where a care
provider needs to select a treatment option for a patient based on the exact kind of cancer …

Development of Advanced Edge Computing Framework using Rich Client Devices

M Oguchi, S Yamaguchi - 2020 IEEE Eighth International …, 2020 - ieeexplore.ieee.org
An idea of edge computing becomes popular as the data can be processed in the vicinity of
client IoT devices. Since the performance of client devices is not high, they only collect the …